Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My favorite supermicro facepalm will always be when you could set the IPMI encryption cipher to "none" (ipmitool -C0) and bypass actually needing any password at all. (Though I don't think this was unique to supermicro actually?)


Dell also had this problem, you still needed to provide a password, it simply didn’t check the password.


With some server vendors, if you don't connect an ethernet cable to the BMC, it can intercept BMC-targeted traffic from the OS-connected ethernet port.


Pretty much all of them allow unrestricted access from KMS from factory, tough all of them have a way to disable it once configured, and HPE even throws shade until it's limited. KMS only works from the host itself.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: